2015
DOI: 10.1109/tcad.2015.2419619
|View full text |Cite
|
Sign up to set email alerts
|

The HEROIC Framework: Encrypted Computation Without Shared Keys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 42 publications
(20 citation statements)
references
References 30 publications
0
20
0
Order By: Relevance
“…The KPU slows down by 10-40% in encrypted running under AES-128 as compared to running unencrypted (measures are from [17]), and with its base clock set at 1 GHz (3 ns cache), it runs like a 433 MHz classic Pentium, 7 so a KPU is quite fast. 8 The KPU's nearest competitor among homomorphic systems is HEROIC [21], which has a stack machine architecture [22]. HEROIC embeds 2048-bit additively homomorphic Paillier encryption [23] in its encrypted working.…”
Section: Homomorphic Systemsmentioning
confidence: 99%
“…The KPU slows down by 10-40% in encrypted running under AES-128 as compared to running unencrypted (measures are from [17]), and with its base clock set at 1 GHz (3 ns cache), it runs like a 433 MHz classic Pentium, 7 so a KPU is quite fast. 8 The KPU's nearest competitor among homomorphic systems is HEROIC [21], which has a stack machine architecture [22]. HEROIC embeds 2048-bit additively homomorphic Paillier encryption [23] in its encrypted working.…”
Section: Homomorphic Systemsmentioning
confidence: 99%
“…If we continue iterating, we have z 3 ← 2302, bit 3 ← 2302 · (2302·2302) −1 = 2743, G(2743, 4393) 3 = 5163 (using r = 9 for 0), sum 3 ← 3807 · 5163 = 906, y 3 ← 4393 · 4393 = 5483, and x 3 ← 2302 (note that Dec(sum 3 ) = 6, Dec(y 3 ) = 24 and Dec(x 3 ) = 0). 9 At last, z 4 ← 2302, bit 4 ← 2743,…”
Section: Encrypted Multiplication (Top Level Alg 1)mentioning
confidence: 99%
“…Recall that if the result of Leq(·) was F alse, function G would have returned 1812 · 1307 = 2613 instead of 1812 9. Note that, in this simple example, z remains unchanged since the same r values were used in each invocation of Div2.…”
mentioning
confidence: 99%
“…In using the Paillier encryption we follow (Tsoutsos and Maniatakos, 2013;Tsoutsos and Maniatakos, 2015), where a 'one instruction' stack machine architecture ('HEROIC') for encrypted computing embedding a 16-bit Paillier encryption is prototyped. In conjunction with a lookup table for the signs (positive/negative) of encrypted data, the Paillier addition is computationally complete (any computable function can be implemented using addition, the table, an encrypted 1, and recursion), and addition, subtraction, and comparison machine code instructions suffice to write software routines for the rest.…”
Section: Overview and Related Workmentioning
confidence: 99%
“…That decodes r2. (Tsoutsos and Maniatakos, 2015) avoids the problem by providing only the x+k operation, for constants k, not x+y (hence not x+x or x−x), so we might declare all two-operand OpenRISC instructions offlimits, leaving only the one-operand ones: x+k and x<k are formally safe because x→x+K is an automorphism that turns y=x+k into y+K=(x+K)+k, and x<k into x+K<k where k =k+K, so there will be 2 32 self-consistent readings x+K, y+K, etc. for any choice of K, for any guess by the operator at a consistent assignment of decrypted values x, y, etc.…”
Section: Securitymentioning
confidence: 99%